Skip to content

Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE from installation or Settings.

Notifications You must be signed in to change notification settings

sromanhu/CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

ConcreteCMS Stored XSS v.9.2.1

Author: (Sergio)

Description: Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE parameter from installation or in the Settings.

Attack Vectors: Scripting A vulnerability in the sanitization of the entry in the Site of Installation or Settings allows injecting JavaScript code that will be executed when the user accesses the web page.


POC:

In the installation process we add the payload in the SITE parameter:

image

XSS Payload:

<img src=x:alert(alt) onerror=eval(src) alt='XSS Site'>

In the following image you can see the embedded code that executes the payload in the main web. image


Additional Information:

https://www.concretecms.com/

https://owasp.org/Top10/es/A03_2021-Injection/

About

Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE from installation or Settings.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published